Sciweavers

1709 search results - page 260 / 342
» networks 2000
Sort
View
DSN
2000
IEEE
14 years 1 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
HICSS
2000
IEEE
153views Biometrics» more  HICSS 2000»
14 years 1 months ago
On Verifying Distributed Multithreaded Java Programs
Distributed multithreaded software systems are becoming more and more important in modern networked environment. For these systems, concurrency control and thread synchronization ...
Jessica Chen
ICNP
2000
IEEE
14 years 1 months ago
Characterization and Performance Evaluation for Proportional Delay Differentiated Services
In this paper, we consider a proportional delay model for Internet differentiated services. Under this model, an ISP can control the “spacing” of waiting times between differe...
Matthew K. H. Leung, John C. S. Lui, David K. Y. Y...
ICNP
2000
IEEE
14 years 1 months ago
Optimal Partitioning of Multicast Receivers
Multicast sessions may have a large number of receivers with heterogeneous reception capacities. To accommodate this heterogeneity, various multi-rate schemes, based upon the use ...
Yang Richard Yang, Min Sik Kim, Simon S. Lam
IJCNN
2000
IEEE
14 years 1 months ago
Analysis of Fluctuation-Induced Firing in the Presence of Inhibition
This paper examines the computational role of inhibition as it moves towards balancing concurrent excitation using the biologically-inspired Temporal Noisy-Leaky Integrator (TNLI) ...
Chris Christodoulou, Trevor G. Clarkson, John G. T...